METHODS AND SYSTEMS TO ANALYZE EVENT SOURCES WITH EXTRACTED PROPERTIES, DETECT ANOMALIES, AND GENERATE RECOMMENDATIONS TO CORRECT ANOMALIES

    公开(公告)号:US20190026459A1

    公开(公告)日:2019-01-24

    申请号:US15653269

    申请日:2017-07-18

    Applicant: VMware, Inc.

    Abstract: Methods and systems are directed to automatically analyzing the behavior of event sources, detecting anomalies in the behavior of event sources, and generating recommendations to correct the detected anomalies. An event source can be an application program, an operating system, a virtual machine, a container, or any other source of event messages in a computer system. Method quantify the event messages generated over time to form property time series data, which is metadata regarding the event messages generated by the event source. Methods compute a threshold from the property time series data. Methods detect abnormal states of the event source when property data points of the property time series data violate the threshold. A systems administrator may be notified by a property digression alert displayed on a system console. Methods also generate a recommendation to correct the anomalous behavior and optimize performance of the event source.

    METHODS AND SYSTEMS TO PRIORITIZE ALERTS WITH QUANTIFICATION OF ALERT IMPACTS

    公开(公告)号:US20180341566A1

    公开(公告)日:2018-11-29

    申请号:US15604460

    申请日:2017-05-24

    Applicant: VMware, Inc.

    Abstract: Methods and systems are directed to quantifying and prioritizing the impact of problems or changes in a computer system. Resources of a computer system are monitored by management tools. When a change occurs at a resource of a computer system or in log data generated by event sources of the computer system, one or more of the management tools generates an alert. The alert may be an alert that indicates a problem with the computer system resource or the alert may be an alert trigger identified in an event message of the log data. Methods described herein compute an impact factor that serves as a measure of the difference between event messages generated before the alert and event messages generated after the alert. The value of the impact factor associated with an alert may be used to quantitatively prioritize the alert and generate appropriate recommendations for responding to the alert.

    Authentication source selection
    23.
    发明授权

    公开(公告)号:US10140443B2

    公开(公告)日:2018-11-27

    申请号:US15098290

    申请日:2016-04-13

    Applicant: VMware, Inc.

    Abstract: An example method is provided for a computing device to select an authentication source. The method may comprise receiving a request to authenticate a user account and determining multiple authentication sources that are capable of processing the request. The multiple authentication sources may be associated with respective performance indicators. The method may also comprise selecting a particular authentication source to process the request, wherein the particular authentication source is selected from the multiple authentication sources based on the performance indicators. The method may further comprise processing the request using the particular authentication source to authenticate the user account.

    Outbound request management
    24.
    发明授权

    公开(公告)号:US11102141B2

    公开(公告)日:2021-08-24

    申请号:US16451037

    申请日:2019-06-25

    Applicant: VMware, Inc.

    Inventor: Vardan Movsisyan

    Abstract: The present disclosure is related to devices, systems, and methods for routing requests for an external service, originating from a plurality of cluster nodes, through an outbound request manager. An example method can include receiving a first request for an external service originating from a first cluster node having a first network address, receiving a second request for the external service originating from a second cluster node having a second network address, transmitting the first request with a particular network address to an address associated with the external service, and transmitting the second request with the particular network address to the address associated with the external service.

    Migrating virtualized computing instances that implement a logical multi-node application

    公开(公告)号:US10725810B2

    公开(公告)日:2020-07-28

    申请号:US15610656

    申请日:2017-06-01

    Applicant: VMWARE, INC.

    Abstract: Some embodiments of the invention provide a novel method of migrating virtualized computing instances (VCIs) that implement a multi-node application. The method may identify a plurality of VCIs that implement a multi-node application, each of the plurality of VCIs being executed on a respective source host, and may identify a role performed by each VCI of the identified plurality of VCIs. The method may also generate a plurality of batches, each batch of the plurality of batches including a set of the identified plurality of VCIs selected based on the identified role of each of the VCIs, and generate a migration sequence comprising an ordered sequence of the plurality of batches. The method may migrate the identified plurality of VCIs from its respective source host to a respective destination host according to the migration sequence.

    Alerts provided based on responder profile

    公开(公告)号:US10325455B2

    公开(公告)日:2019-06-18

    申请号:US15357321

    申请日:2016-11-21

    Applicant: VMware, Inc.

    Inventor: Vardan Movsisyan

    Abstract: The present disclosure is related to devices, systems, and methods for alerts provided based on responder profile. An example device can include instructions to receive an alert message via an operations management server, access a plurality of alert responder profiles in storage, each associated with a respective alert responder and determined based on historical actions of the respective alert responder, and communicate the alert message to an alert responder having an alert responder profile that exceeds a threshold correlation with the alert message.

    Error determination from logs
    27.
    发明授权

    公开(公告)号:US10185613B2

    公开(公告)日:2019-01-22

    申请号:US15142893

    申请日:2016-04-29

    Applicant: VMware, Inc.

    Abstract: The present disclosure is related to devices, systems, and methods for determining errors from logs. An example device can include instructions to analyze a log of a log source, determine an error in the log, the error resulting from a user action with respect to the log source, and provide a portion of the log associated with the error to a user interface.

    METHODS AND SYSTEMS TO ADJUST A MONITORING TOOL AND AUXILIARY SERVERS OF A DISTRIBUTED COMPUTING SYSTEM

    公开(公告)号:US20180365044A1

    公开(公告)日:2018-12-20

    申请号:US15628369

    申请日:2017-06-20

    Applicant: VMware, Inc.

    Abstract: Methods and systems adjust resources and monitoring configuration of a monitoring tool and auxiliary servers of a distributed computing system. Any new virtual object installed in the distributed computing system or change in functionality of an existing virtual object of the distributed computing system is identified. Expected configuration rules and resource allocation rules are determined for the virtual object. The expected configured rules are used to adjust a monitoring configuration of the monitoring tool. The resource allocation rules are used to adjust the infrastructure resources available to the monitoring tool. When the virtual object creates a change in demand for auxiliary services, corresponding auxiliary servers are installed, removed, or changed in the distributed computing system. Resource allocated rules and expected configuration rules are determined for the auxiliary servers and used to adjust the infrastructure resources and monitoring configuration of the monitoring tool. Methods optimize distributions of virtual objects.

    Access control for user accounts using a parallel search approach

    公开(公告)号:US10104087B2

    公开(公告)日:2018-10-16

    申请号:US15093747

    申请日:2016-04-08

    Applicant: VMware, Inc.

    Abstract: An example method is provided for a computing device to perform access control for a user account. The method may comprise receiving a request for the user account to access a resource; determining a first permission set and a second permission set required to access the resource; and performing a first search and a second search in parallel. Prior to receiving results from the second search and in response to determination that the user account is assigned to the first permission set based on results of the first search, permitting the user account to access the resource using the first permission set; and in response to determination that the user account is assigned to the second permission set based on results of the second search, permitting the user account to access the resource using the second permission set.

    USER INTERFACE CUSTOMIZATION BASED ON USER TENDENCIES

    公开(公告)号:US20180143744A1

    公开(公告)日:2018-05-24

    申请号:US15357242

    申请日:2016-11-21

    Applicant: VMware, Inc.

    Abstract: The present disclosure is related to devices, systems, and methods for user interface customization. An example device can include instructions executable by a processor to receive indications of user actions with respect to an application, wherein the actions are made using a plurality of selectable elements of an interface, determine a user tendency based on the user actions, and provide a customized interface to the user based on the determined user tendency, wherein the customized interface includes at least one customized selectable element.

Patent Agency Ranking